what is

5 Sandbox Tools for Phishing Analysis in 2024

There is a wide variety of solutions one can use to investigate phishing attacks. Yet, in most cases, analysts can…

7 days ago

Quickly Check if a Sample is Malicious with ANY.RUN Sandbox Process Tree

ANY.RUN's Process Tree shows all the processes that start when a file or URL is run in its sandbox, along…

2 weeks ago

What is Malware Packers? How To Analyse With ANY.RUN Sandbox – SOC/DIFR Guide

Antiviruses can quickly detect malicious executable files, but attackers can bypass this by using packers to compress and obfuscate the…

3 weeks ago

DNS Tunnel Keylogger – An Offensive Post-Exploitation Tool For Pentesters

A new keylogging server and client tool have been released on GitHub for pentesters. The tool utilizes DNS tunneling to…

3 weeks ago

Best Practices for Email Security Headers – 2024

Email hacking and fraud have become common these days. Cybercriminals can easily break into and take control of mail accounts…

1 month ago

5 Steps to Effective Junior SOC Specialist Training in 2024

The Security Operations Center (SOC) is critical to any organization's cybersecurity strategy. Every SOC’s success hinges on the competence of…

1 month ago

What is CNAPP ? How It Benefits for Multi-Cloud & Hybrid Infrastructure Protection

Multi-cloud and hybrid infrastructures are becoming the norm among enterprises nowadays. Around 9 in 10 companies use a multi-cloud strategy,…

1 month ago

OpenCTI With ANY.RUN: OSINT Platform to SOC & MDR Teams for Malware Analysis

ANY.RUN integrates with OpenCTI to streamline threat analysis, which allows enriching OpenCTI observations with data directly from ANY.RUN analysis. OpenCTI…

1 month ago

HackerGPT 2.0 – A ChatGPT-Powered AI Tool for Ethical Hackers & Cyber Community

HackerGPT is an advanced AI tool created specifically for the cybersecurity industry, handy for individuals engaged in ethical hacking and…

2 months ago

How to Analyse Crypto Malware in ANY.RUN Sandbox ?

ANY.RUN, an interactive malware sandbox, has published a comprehensive analysis of the growing threat that crypto-malware poses in a time…

2 months ago